6 om as a public service of the RAND Corporation.

advertisement
THE ARTS
CHILD POLICY
CIVIL JUSTICE
EDUCATION
ENERGY AND ENVIRONMENT
This PDF document was made available from www.rand.org as
a public service of the RAND Corporation.
Jump down to document6
HEALTH AND HEALTH CARE
INTERNATIONAL AFFAIRS
NATIONAL SECURITY
POPULATION AND AGING
PUBLIC SAFETY
The RAND Corporation is a nonprofit institution that
helps improve policy and decisionmaking through
research and analysis.
SCIENCE AND TECHNOLOGY
SUBSTANCE ABUSE
TERRORISM AND
HOMELAND SECURITY
TRANSPORTATION AND
INFRASTRUCTURE
WORKFORCE AND WORKPLACE
Support RAND
Purchase this document
Browse Books & Publications
Make a charitable contribution
For More Information
Visit RAND at www.rand.org
Explore the RAND National Defense
Research Institute
View document details
Limited Electronic Distribution Rights
This document and trademark(s) contained herein are protected by law as indicated in a
notice appearing later in this work. This electronic representation of RAND intellectual
property is provided for non-commercial use only. Unauthorized posting of RAND PDFs
to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law.
Permission is required from RAND to reproduce, or reuse in another form, any of our research
documents for commercial use. For information on reprint and linking permissions, please
see RAND Permissions.
This product is part of the RAND Corporation monograph series. RAND
monographs present major research findings that address the challenges facing
the public and private sectors. All RAND monographs undergo rigorous peer
review to ensure high standards for research quality and objectivity.
Are Law and Policy
Clear and Consistent?
Roles and Responsibilities of
the Defense Acquisition Executive
and the Chief Information Officer
Daniel Gonzales, Carolyn Wong, Eric Landree, Leland Joe
Prepared for the United States Navy
Approved for public release; distribution unlimited
NAT IONAL DE FENS E RES EA RC H I NSTITUTE
The research described in this report was prepared for the United States
Navy. The research was conducted in the RAND National Defense
Research Institute, a federally funded research and development center
sponsored by the Office of the Secretary of Defense, the Joint Staff,
the Unified Combatant Commands, the Department of the Navy,
the Marine Corps, the defense agencies, and the defense Intelligence
Community under Contract W74V8H-06-C-0002.
Library of Congress Control Number: 2010932669
ISBN: 978-0-8330-4970-4
The RAND Corporation is a nonprofit institution that helps improve
policy and decisionmaking through research and analysis. R AND’s
publications do not necessarily reflect the opinions of its research clients
and sponsors.
R® is a registered trademark.
© Copyright 2010 RAND Corporation
Permission is given to duplicate this document for personal use only, as
long as it is unaltered and complete. Copies may not be duplicated for
commercial purposes. Unauthorized posting of RAND documents to
a non-RAND website is prohibited. RAND documents are protected
under copyright law. For information on reprint and linking permissions,
please visit the R AND permissions page (http://www.rand.org/
publications/permissions.html).
Published 2010 by the RAND Corporation
1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138
1200 South Hayes Street, Arlington, VA 22202-5050
4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665
RAND URL: http://www.rand.org
To order RAND documents or to obtain additional information, contact
Distribution Services: Telephone: (310) 451-7002;
Fax: (310) 451-6915; Email: order@rand.org
Summary
This monograph presents an analysis of the roles and responsibilities (R&R) assigned to
defense acquisition executives (DAEs) and chief information officers (CIOs) by Titles
10, 40, and 44 of the United States Code (USC) and by DoD policy. Its objectives are
to identify and analyze DAEs’ and CIOs’ R&R, identify the sources of potential conflicts that may occur between DoD executives when they carry out their duties in the
DoD acquisition process, and to formulate remedies for these potential conflicts in the
form of revisions to DoD policy.
Roles and Responsibilities (R&R)
For the purposes of this study, R&R refer to activities, actions, tasks, duties, jobs, or
functions assigned to an executive by an authoritative source. Authoritative sources
include federal law, executive orders, Office of Management and Budget (OMB) circulars, and DoD policy documents. Some R&R include high-level, unique decisionmaking authorities, such as setting, establishing, or directing policy or overseeing the
implementation of policy, that are not at first glance controlled or potentially circumscribed by other DoD executives. We term these strong R&R.
Other CIO R&R have authorities that are more circumscribed, such as advising
other officials or making recommendations to other executives who hold actual decisionmaking power. We term the latter advisory R&R.
Strong R&R are the ones of primary interest in this study because these are the
R&R that could potentially result in conflict between government executives.
Information Technology and National Security Systems
The DAE’s acquisition authorities are broad and comprehensive. The DAE and his or
her duly designated subordinates are responsible for the acquisition of any type of DoD
system or platform that the U.S. military procures, including ships, aircraft, weapons, command and control, communications, intelligence, and information technology (IT) systems. In contrast, CIO R&R are generally restricted to IT and national
xi
xii
Are Law and Policy Clear and Consistent?
security systems. For this study, we reviewed how IT and NSS are defined in U.S.
law.1 The review focused on R&R that are pertinent to IT and NSS. We also sought to
understand the R&R of these executives in the larger context of DoD policy guidance
for the development and acquisition of weapon systems containing IT components.
Acquisition-Related R&R
Titles 10 and 40 of the USC contain seven strong DoD acquisition-related R&R, as
indicated in Table S.1.
Six of these are assigned to the Under Secretary of Defense for Acquisition, Technology and Logistics (USD(AT&L)). We found that the first six R&R listed in Table S.1
do not pose a risk of possible conflicts between the DAE and the DoD CIO when they
exercise their duties in the defense acquisition system (we term these process conflicts).
Table S.1
Strong DoD Acquisition Executive R&R in the U.S. Code
USC
Source
Party
Role and Responsibility
Source of
Acquisition Process
Conflict
10 USC
§133
USD(AT&L)
Supervises the acquisition system
10 USC
§133
USD(AT&L)
Establishes acquisition policy
10 USC
§133
USD(AT&L)
Directs secretaries of military
departments and heads of all other
elements of DoD with regard to matters
for which USD(AT&L) has responsibility
10 USC
§133
USD(AT&L)
Is designated DAE
10 USC
§133
USD(AT&L)
Authorizes a senior acquisition official
within the Office of USD(AT&L) to
oversee the exercise of any DoD
acquisition authority
No
10 USC
§1702
USD(AT&L)
Has all powers, duties, and functions
over the acquisition workforce
No
40 USC
§11314
Executive agency
head
Has acquisition authority with particular
attention to multi-agency IT acquisitions
No
1
Precise legal definitions of IT and NSS can be found in the body of this monograph.
No
No
No
No
Summary
xiii
The last R&R listed in the table is assigned to the agency head (the Secretary
of Defense in the case of DoD).2 This R&R explicitly relates to IT (the authority to
acquire and manage IT, which is assigned to the “Head of the Executive Agency”).
Our analysis revealed that this R&R, as it applies to DoD, does not conflict with
other parts of U.S. law and should not be a source of conflict in the DoD acquisition
process between the DAE and the DoD CIO. This conclusion follows because the
assignment of acquisition authority for DoD IT and NSS programs specified in relevant DoD policy (DoD Directives [DODDs] 5000.02 and 5144.1) clearly preserves
the primacy of the DAE in acquisition matters.
DoD CIO R&R
Our analysis of CIO R&R shows that the USC specifies 15 current CIO R&R.3 Of
these, five are strong CIO R&R and are listed in Table S.2.
We found that three of these strong CIO R&R do not pose a risk of conflict in
the DoD acquisition process. In other words, they do not pose a risk of process conflict.
Table S.2
Strong DoD CIO R&R in the U.S. Code Applicable to IT and NSS
USC
Source
Party
Role and Responsibility
Source of
Acquisition Process
Conflict
10 USC
§2223
DoD CIO
Ensure IT and NSS interoperability
Ensure that IT and NSS standards are prescribed for
all DoD
Yes
10 USC
§2223
Military
Department
CIO
Ensure that military department IT & NSS are
interoperable
Ensure compliance with DoD standards
No
44 USC
§3534
Agency CIO
Develop and maintain agency-wide information
security program and policies
No
44 USC
§3544
Agency CIO
Report annually on effectiveness of information
security program
No
40 USC
§11315
Agency CIO
Develop secure integrated IT architecture
Promote effective design and operation of
information management processes
No
2
Although R&R is a plural noun, we often refer to it in the singular for the sake of convenience.
3
The full list of DoD CIO R&R is discussed in the body of this monograph.
xiv
Are Law and Policy Clear and Consistent?
However, two DoD CIO R&R, those in the first and last rows of Table S.2, contain
language that could lead to potential conflicts in the DoD acquisition process if these
are not resolved by specific guidance in DoD policy.
Our analysis revealed that the first R&R listed in the table, regarding the prescription of standards for IT and NSS, has led to actual process conflicts. We make this
assertion on the basis of empirical evidence cited in the body of this monograph. This
means that this R&R could lead to executive actions that might potentially complicate or delay the acquisition of DoD command and control, weapon, and intelligence
systems.
Our analysis also revealed that the last R&R listed in the table, regarding the
development of integrated IT architectures, could also potentially lead to conflicts in
the acquisition process. However, in this case we found that the most recent relevant
DoD policy, DoDD 8000.01, should eliminate any such potential conflicts. But we
highlighted the last CIO R&R entry in Table S.2 in yellow because not all DoD policy
appears to be consistent with DoDD 8000.01. As we describe in Chapter Four, some
older DoD policies are not consistent with DoDD 8000.01 and with DoDI 5000.2.
We summarize our analysis of DoD CIO R&R below.
The first DoD CIO R&R shown in Table S.2 is from Section 2223 of Title 10
and contains a number of strong R&Rs. In our analysis of the defense acquisition process and the roles of the acquisition and CIO executives in that process, we found that
one of these R&R poses a risk of process conflict.
DoD CIO R&R: Prescription of Information System Standards
10 USC §2223 includes one strong DoD CIO R&R:
Ensure that information technology and NSS standards that will apply through
out DoD are prescribed.
We found that process conflicts could and do occur between the DoD CIO,
acquisition program milestone decision authorities (MDAs), and the Joint Staff. In
the body of this monograph, we present empirical evidence that such process conflicts
indeed occur. It is possible that the DoD CIO’s standard-setting authorities established
in USC 10 Section 2223 could conflict with the USD(AT&L)’s R&R established
in USC 10 Section 133 when these executives or their representatives exercise their
authorities in the DoD acquisition process. In our review of current DoD policy, we
found that current policy does not address this potential process conflict adequately.
Therefore we designate it an actual process conflict.
This particular process conflict was recognized and addressed in DoDD 5101.7,
which defined the R&R for the DoD executive agent for IT standards and also established a governance structure for identifying, prescribing, and implementing IT standards. Most important, it established the IT Standards Oversight Panel (ISOP), tri-
Summary
xv
chaired by the DoD CIO, USD(AT&L), and the Vice Chairman of the Joint Chiefs
of Staff, to provide direction, oversight, and priorities for IT standards matters and to
resolve any issues that may arise. However, DoDD 5101.7 has expired.
To our knowledge, current DoD policy does not provide a complete replacement
for DoDD 5101.7. A memorandum was issued by the Deputy Secretary of Defense
in May 2007 that cites the expiration of DoDD 5101.7 and preserves the role of the
Defense Information Systems Agency (DISA) as the DoD executive agent for IT standards, but it does not extend the tenure of the ISOP or provide any other detailed guidance for resolving conflicts on IT standards that may arise between the DoD CIO and
the DAE or their representatives.4
Military Department CIO R&R: Ensure Compliance with DoD IT Standards
10 USC §2223 contains strong and advisory R&R for military department CIOs. As
described above, we only consider potentially strong R&R to discern if process conflicts may arise between DoD executives.
The USC states that the CIO of a military department shall ensure that IT and
NSS are in compliance with standards of the government and DoD.5 It is important
to note that DoD policy should state what constitutes “compliance” with government
and DoD standards. The Secretary of Defense (SECDEF) is obligated to issue policy
that is consistent with the USC and removes any potential ambiguities or conflicts as
to what should constitute compliance with government or DoD standards. In this case,
the SECDEF must ensure that adequate compliance data are available in the department for use by the different military services and defense agencies. Per DoDD 5144.1,
the availability of these data is the responsibility of the DoD CIO. If that responsibility
is carried out effectively, DoD policy should eliminate any potential sources of conflict between DoD executives and the CIOs of military departments in the acquisition
process.
Agency CIO R&R: Information Security
The USC assigns the agency CIO the responsibility to develop information security
policy and to establish and maintain an information security program. These R&R
give the CIO the authority to establish procedures and mechanisms for classifying,
assessing, and testing the information assurance (IA) capabilities of IT and NSS.
Pending the results of such assessments and tests, IT or NSS developed by an acquisition program will be given an “authority to operate” designation by the appropriate IA
approval authority. If the program fails these IA assessments, then the program would
4
Gordon England, Deputy Secretary of Defense, “DoD Executive Agent for Information Technology (IT)
Standards,” memorandum, May 21, 2007.
5
It is important to note that the DoD CIO and the military CIOs are distinct individuals in the DoD. DoDD
5144.1 assigns CIO R&R only to the DoD CIO.
xvi
Are Law and Policy Clear and Consistent?
have to take remedial measures to improve its IA status. As with operational testing, it
is important to have an independent organization responsible for conducting IA assessments and tests of acquisition programs. Otherwise, there may be opportunities for
conflicts of interest to arise in the test process. For these reasons, we do not believe that
agency CIO R&R conflict with DAE R&R in the acquisition process.
Agency CIO R&R: Information Security Program Annual Report
This section assigns the agency CIO the responsibility to produce an annual report
describing the effectiveness of the information security program. This R&R does not
conflict with any DAE R&R.
DoD CIO R&R: IT Architecture Development
In this analysis, we identified potential architecture development R&R in the USC
that pose the risk of conflicts in the DoD acquisition process. These apparent conflicts
have been resolved by recent changes to DoD policy, as indicated below, but not by
older DoD policies that appear to still be in force.
DoDD 8000.01 and DoDI 5000.02, both of which have been recently updated,
are consistent with the actual process for developing and validating architectures used
in the DoD acquisition process. In this process, integrated joint architectures are developed collaboratively by many parts of the DoD acquisition and requirements communities. No single organization is responsible for, or has the capability to develop, a joint
integrated architecture, nor does any single organization have the capability to develop
the entire Defense Information Enterprise Architecture (DIEA).
Most important, DoDD 8000.01 gives the Assistant Secretary of Defense for
Networks and Information Integration (ASD(NII))/DoD CIO the responsibility for
providing standards for developing, maintaining, and implementing the DIEA, but
not for developing IT architectures based on DIEA standards. This means that DIEA
standards specified by the DoD CIO can be used to electronically combine and deconflict architecture products developed by different DoD organizations, which is a major
technical advance that should reduce the time and cost required to develop integrated
architecture products in the decentralized manner now used for this task.
Recommendations
We found that potential process conflicts in the DoD acquisition process could occur
in two areas:
• setting IT standards
• developing an IT architecture.
Summary
xvii
Recent updates to DoD policy, specifically DoDD 8000.01 and DoDI 5000.02,
reduce the potential for the second type of process conflict. However, we note here that
older DoD policy relevant to this issue, in particular DoDD 5144.1, should be updated
to be consistent with DoDD 8000.01 and DoDI 5000.02.
The following recommendations provide ways to minimize or avoid the first type
of conflict.
Retain the ISOP and Update DoDD 5101.7
An important role for DoD policy and the senior leaders of the department is to resolve
conflicts as they arise. The ISOP, which was established in DoDD 5101.7, is an important organizational tool that enables collaboration among key stakeholder organizations in DoD. We recommend that the provisions of this directive be reissued and that
the department (perhaps in this new policy) develop a revitalized organizational structure for reviewing and approving technical standards for IT and NSS.
The new Global Information Grid (GIG) technical guidance (GTG) Configuration Management Board (CMB) is an important step in this direction. The CMB
should encourage collaborative development of IT standards with the participation of
technical experts from the services who have experience with warfighting systems and
their use in the wide range of operational environments characteristic of real-world
military operations. IT standards may not be common across the entire range of operational environments found in air, ground, maritime, and space operations. Improved
collaboration and conflict resolution mechanisms that can tap into this wide range of
engineering and operational expertise should be developed and implemented at lower
levels in the department to reduce the time needed by senior leaders to resolve such
conflicts.
Screen IT Standards for Technical Maturity
We recommend that DoD screen IT standards for technical maturity because the
department has encountered increasing difficulty in developing and reaching consensus on IT standards for military systems. Difficulties in reaching agreement on IT
standards may be due to a lack of appreciation of the technical risks associated with
implementing new standards or technologies that may have received relatively little
vetting or independent review.
Congress has become concerned with increasing technical risk in DoD acquisition programs. This concern led to changes to the DoD acquisition process mandated
by recent revisions to the law found in 10 USC §2366(b). One element of this new
law requires that the Director of Defense Research and Engineering (DDR&E) review
the technical maturity of critical technology elements of programs prior to major milestone reviews. An additional step that may reduce technical risk and help vet technical
standards for inclusion in the joint technical architecture (or the GTG) would be a
review of the technical maturity of proposed IT standards for DoD programs just prior
xviii
Are Law and Policy Clear and Consistent?
to major milestone reviews. As with program technology readiness assessments, the
review of the technical maturity of proposed IT standards would be conducted immediately before acquisition program milestone reviews. Programs would be required to
present evidence that the new technical standards selected for the program are stable,
precise, and specific; are available to more than one contractor; and have been successfully demonstrated in a relevant or operationally suitable environment. Such a review
would enable the acquisition community to review IT standards proposed by individual programs, by the DoD CIO, or by other organizations. If this review process
were conducted in a collaborative fashion, it could increase the level of trust and understanding between the acquisition and CIO communities.
Possible Next Steps
While we have made concrete recommendations based on our review of the USC and
several primary DoD policy documents, time and resource limitations prevented us
from conducting a comprehensive review of GIG policies and architecture guidance
documents. Even in our limited review of GIG policy, we found an older policy memo
that conflicts with DoDD 5000.02 and DoDD 8000.01. It is possible—even likely—
that other older GIG policy conflicts with the new DIEA concept and approach identified in DoDD 8000.01. A comprehensive review of GIG policy should be conducted to
identify conflicts between GIG and DoD policies. Because this body of policy is quite
new, automated or semiautomated methods of policy analysis should be developed to
facilitate such a policy review. These tools could also be used to assess the consistency
of DoD policy in other areas.
Download